1 - Intro Flashcards

1
Q

Cryptography uses

A

E commerce, transactions.

Authentication, data integrity, signatures, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography idea

A

“Secret communication”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalysis

A

“Code Breaking”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive attacks

A

Listening in/Interception (classical attack)
Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active attacks

A

Message tampering
Replay attacks (send message again)
Impersonation
Man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality

A

Message can only be read by intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

Guarantees identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Unauthorised changes to message detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-repudiation

A

Party cannot DENY that a message was sent/received by them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why use a key?

A

You do not need to redesign the algorithm every time it is compromised when communicating with several different people.

Different people, different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Should you assume the algorithm is secret?

A

No, “The algorithms should be assumed to be publicly known” (kerckhoff’s principle)A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages of public algorithms

A

Weak algorithims discarded
Strong algorithms improve
Protocol standards
Less likely to have backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric Cryptography

A

Both parties use the same key.

Issue: Have to share key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If Symmetric key is transferred over secure channel, why would you not just communicate overall using that channel?

A

Expensive,
Channel may not be permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public-key cryptography

How does it work

A

Each party has a private and public key.

Others encrypt using recipients public key. Only recipients private key can decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric vs public key: Speed

A

Symmetric is much faster than public-key

17
Q

Symmetric vs public-key: Cost

A

Symmetric may require an expensive secure channel. Public-key cheaper.

18
Q

How can public key and symmetric be used simultaneously?

A

Use public key crypto to send symmetric key and switch.